Operations | Monitoring | ITSM | DevOps | Cloud

Building a Go-to-Market Strategy for Developer Tools

As a YC alum and co-founder of Mattermost, I often get asked by early stage YC companies about what it’s like to build a commercial open source business. With the start-up’s permission, we’ve started recording some of the Q&A sessions, transcribing them and sharing the more popular questions on the Mattermost blog in short form articles.

TeamTNT: Latest TTPs targeting Kubernetes (Q1-2021)

In April 2020, MalwareHunterTeam found a number of suspicious files in an open directory and posted about them in a series of tweets. Trend Micro later confirmed that these files were part of the first cryptojacking malware by TeamTNT, a cybercrime group that specializes in attacking the cloud—typically using a malicious Docker image—and has proven itself to be both resourceful and creative.

Integrating Logging into CI/CD

In my experience, pipeline monitoring and management is traditionally either left for the last developer who deployed, or unmonitored entirely. This lack of centralized monitoring and production-level resiliency can lead to significant development delays or even bring pipeline and train deliveries to a grinding halt. But we can do better.

SQL Server Problems? Try These Tips First

When SQL Server is having performance issues, giving you error messages, or just running slowly, you need to figure out the root cause of the problem before making any changes. Don’t jump to conclusions—make sure you get a big-picture view of the issue. Start with these five troubleshooting tips to optimize your SQL Server performance.

Scaling Software Supply Chains Securely

Software supply chains are mission-critical for digital businesses, and as global conditions accelerate the growth in contactless interactions and transactions, many organizations are reviewing how to solve the challenge of scaling the volume and velocity of their software development and release processes to meet the digital demand. The latest JFrog Platform release delivers a rich payload of new capabilities to scale and secure the software supply chain for digital businesses.

Back Again: The Mobile Endpoint Is Now the Policy Enforcement Point in the Everywhere Workplace!

Several years back before the COVID-19 pandemic hit and the work-from-home shift took hold, we wrote a blog about how the mobile-centric zero trust framework removed the traditional perimeter security controls to protect the corporate enterprise network and all connected endpoints from cybercriminals.

9 Things We Learned From the Digital Workspace Survey

The Digital Workspace Survey conducted by eG Innovations and xenappblog is one of the largest surveys of its kind, generating over 1,050 responses from IT professionals around the world. 62% of the respondents worked for organizations using digital workspaces for their employees. The remainder came from various types of organizations providing support for digital workspaces. Below are just a few highlights from the report which is packed with insights.

5 AIOps Trends for 2021

Recently, there has been a steep rise in the research and utilization of Artificial Intelligence (AI). While AI once seemed like nothing more than a fantasy from a sci-fi movie, AI technology is now very much a reality in our everyday lives. Artificial intelligence and machine learning are involved in many of our daily tasks, from search engines that finish your thought, to pulling up directions in Google Maps, and how your Facebook and other social feeds are so perfectly catered to your interests.

Getting Started with Elastic Cloud: A FedRAMP Authorized Service

Elastic Cloud is available for US government users and partners who want to harness the power of enterprise search, observability, and security to make mission-critical decisions. Elastic Cloud is FedRAMP authorized at Moderate Impact level so federal organizations and other customers in highly regulated environments can quickly and easily search their applications, data, and infrastructure for information, analyze data to observe insights, and protect their technology investment.